Using Microsoft Azure Entra ID Multifactor Authentication for CTE GuardPoints
Create an OIDC Application in Entra ID
-
Select Microsoft Entra ID from your Azure Homepage.
-
Click App Registration.
-
Create a New Registration.
-
Record the client ID. You will need it when you create an OIDC connection on CipherTrust Manager.
-
Click Certificates and Secrets in the left Nav bar.
-
Create a new Client Secret. This is the Client Secret value that you will enter in CipherTrust Manager.
-
For the Redirect URI, select Web.
-
Enter redirect URL with your local host name:
http://<localhost>:5560/auth/callback
and save it. -
Click on the name of your registration and click Endpoints.
-
Copy the value for the Endpoint for OpenID Connect metadata document. This is the OIDC Provider value that you will enter in CipherTrust Manager.
Create an OIDC Connection in CipherTrust Manager
-
Log on to the CipherTrust Manager as an administrator.
-
In the left pane, click Access Management > Connections.
-
In the Connections, click Add Connection.
-
Click OIDC and then click Next.
-
Provide a name for the connection and click Next.
-
Enter values collected in the previous section for the configuration information.
-
OIDC Provider:
<value for the Endpoint for OpenID Connect metadata document>
-
Client ID
-
Client Secret
-
-
Click Next and in the Add Products window, select CTE for product.
-
Click Add Connection.
Set Client Profile in CipherTrust Manager
-
In CipherTrust Manager, open the Transparent Encryption application.
-
In the left pane, click Settings > Profiles.
-
Select the desired client profile.
-
Expand MULTIFACTOR AUTHENTICATION.
-
Select the OIDC Connection that you created for Entra ID.
-
Select MFA Exempted User Set from the drop-down list. This user set will be exempted from MFA so MFA will not be enforced on the users of this set. See Exempting some users from authentication with a Whitelist for more information.
Domain Mapping
Domain mapping is required for Entra ID. If you try to log in prior to mapping the domain, CTE generates an error.
You must map the domain from the Entra ID domain to the domain of the existing CTE host. Ask your System Administrator for the domain information.
-
To set the domain, type:
voradmin mfa domains-map set <domain1>:<domain2>
Example
voradmin mfa domains-map set thalesgroup.com:qa.com
Response
Restart secfsd service to affect changes.
Note
You can map multiple domains using a comma in between domain names. For example:
voradmin mfa domains-map set <domain-1-onMFA-provider>:<domain-1-onHost>,<domain-2-onMFA-provider>:<domain-2-onHost>
-
To stop secfsd, type:
net stop secfsd
-
To restart secfsd, type:
net start secfsd